oss-sec mailing list archives

Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability


From: Daniel Beck <ml () beckweb net>
Date: Thu, 25 Jan 2018 16:59:35 +0100


On 11. Dec 2017, at 15:27, Daniel Beck <ml () beckweb net> wrote:

SECURITY-663
Users with the ability to configure sandboxed Groovy scripts are able to
use a type coercion feature in Groovy to create new `File` objects from
strings. This allowed reading arbitrary files on the Jenkins master file
system.

Such a type coercion is now subject to sandbox protection and considered
to be a call to the `new File(String)` constructor for the purpose of
in-process script approval.

CVE-2017-1000505


Current thread: